Applications of Galois Geometries to Coding Theory and Cryptography
|
|
- Jeffrey Terry
- 5 years ago
- Views:
Transcription
1 Applications of Galois Geometries to Coding Theory and Cryptography Ghent University Dept. of Mathematics Krijgslaan Building S Ghent Belgium Albena, July 1, 2013
2 1. Affine spaces 2. Projective spaces OUTLINE 1 GALOIS GEOMETRIES 1. Affine spaces 2. Projective spaces 2 GEOMETRY AND CRYPTOGRAPHY
3 1. Affine spaces 2. Projective spaces FINITE FIELDS q = prime number. Prime fields F q = {0, 1,..., q 1} (mod q). Binary field F 2 = {0, 1}. Ternary field F 3 = {0, 1, 2} = { 1, 0, 1}. Finite fields F q : q prime power.
4 1. Affine spaces 2. Projective spaces AFFINE SPACE AG(n, q) V (n, q) = n-dimensional vector space over F q. AG(n, q) = V (n, q) plus parallelism. k-dimensional affine subspace = (translate) of k-dimensional vector space.
5 1. Affine spaces 2. Projective spaces PARALLELISM IN AFFINE SPACE AG(n, q) Let Π k be k-dimensional vector space of V (n, q). Π k + b, for b V (n, q), are the affine k-subspaces parallel to Π k. Two parallel affine k-subspaces are disjoint or equal. Parallelism leads to partitions of AG(n, q) into (parallel) affine k-subspaces.
6 1. Affine spaces 2. Projective spaces AFFINE PLANE AG(2, 3) OF ORDER 3
7 1. Affine spaces 2. Projective spaces FROM V (3, q) TO PG(2, q)
8 1. Affine spaces 2. Projective spaces FROM V (3, q) TO PG(2, q)
9 1. Affine spaces 2. Projective spaces THE FANO PLANE PG(2, 2)
10 1. Affine spaces 2. Projective spaces THE FANO PLANE PG(2, 2) Gino Fano ( )
11 1. Affine spaces 2. Projective spaces THE PLANE PG(2, 3)
12 1. Affine spaces 2. Projective spaces FROM V (4, q) TO PG(3, q)
13 1. Affine spaces 2. Projective spaces FROM V (4, q) TO PG(3, q)
14 1. Affine spaces 2. Projective spaces PG(3, 2)
15 1. Affine spaces 2. Projective spaces FROM V (n + 1, q) TO PG(n, q) 1 From V (1, q) to PG(0, q) (projective point), 2 From V (2, q) to PG(1, q) (projective line), 3 4 From V (i + 1, q) to PG(i, q) (i-dimensional projective subspace), 5 6 From V (n, q) to PG(n 1, q) ((n 1)-dimensional subspace = hyperplane), 7 From V (n + 1, q) to PG(n, q) (n-dimensional space).
16 1. Affine spaces 2. Projective spaces LINK BETWEEN AFFINE AND PROJECTIVE SPACES AG(n, q) = PG(n, q) minus one hyperplane (the hyperplane at infinity).
17 1. Affine spaces 2. Projective spaces LINK BETWEEN AG(2, 3) AND PG(2, 3)
18 OUTLINE Galois geometries 1 GALOIS GEOMETRIES 1. Affine spaces 2. Projective spaces 2 GEOMETRY AND CRYPTOGRAPHY
19 SECRET SHARING SCHEME 1 Secret sharing scheme: cryptographic equivalent of vault that needs several keys to be opened. 2 Secret S divided into shares. 3 Authorised sets: have access to secret S by putting their shares together. 4 Unauthorised sets: have no access to secret S by putting their shares together.
20 (n, k)-threshold SCHEME 1 n participants. 2 Each group of k participants can reconstruct secret S, but less than k participants have no way to learn anything about secret S.
21 SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME 1 F q = finite field of order q. 2 Dealer chooses polynomial f (X) = f 0 + f 1 X + + f k 1 X k 1 F q [X], and, 3 gives participant number i, point (x i, f (x i )) on graph of f (x i 0). 4 Value f (0) = f 0 is secret S.
22 SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME 1 Set of k participants can reconstruct f (X) = f 0 + f 1 X + + f k 1 X k 1 by interpolating their shares (x i, f (x i )). Then they can compute secret f (0). 2 If k < k persons try to reconstruct secret, for every y F q, there are exactly F q k k 1 polynomials of degree at most k 1 which pass through their shares and the point (0, y). Thus they gain no information about f (0).
23 Galois geometries REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME secret point S 1 S 5 S 2 S 3 S 4
24 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY) 1 Secret S = point of PG(3, q). 2 Shares = planes of PG(3, q) such that exactly three of them only intersect in S. 3 Classical example: Normal rational curve of planes X 0 + tx 1 + t 2 X 2 + t 3 X 3 = 0, t F q, and X 3 = 0.
25 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY) 1 Secret S = point of PG(k, q). 2 Shares = hyperplanes of PG(k, q) such that exactly k of them only intersect in S. 3 Classical example: Normal rational curve of hyperplanes X 0 + tx 1 + t 2 X t k X k = 0, t F q, and X k = 0.
26 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (BLAKLEY)
27 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME
28 GEOMETRICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME
29 CODING-THEORETICAL REALISATION OF SHAMIR S k -OUT-OF-n SECRET SHARING SCHEME (McEliece and Sarwate) 1 C : [n + 1, k, n k + 2] q MDS code. 2 For secret c 0 F q, dealer creates codeword c = (c 0, c 1,..., c n ) C. Share of participant number i is symbol c i. 3 Since C is MDS code with minimum distance n k + 2, codeword c can be uniquely reconstructed if only k symbols are known. 4 So any set of k persons can compute secret c 0. 5 On the other hand, less than k persons do not learn anything about secret, since for any possible secret c, the same number of codewords that fit to secret c and their shares exist.
30 MORE GENERAL SECRET SHARING SCHEME DEFINITION Support of c = (c 1,..., c n ) F n q : sup(c) = {i c i 0}. Let C be linear code. Nonzero codeword c C is called minimal if ρ F q \ {0}. c C \ {0} : sup(c ) sup(c) = c = ρc, (In binary case, c minimal if no non-zero codeword c with sup(c ) sup(c), sup(c ) sup(c))
31 MORE GENERAL SECRET SHARING SCHEME LEMMA (MASSEY) Let C be an [n + 1, k] q -code. Secret sharing scheme is constructed from C by choosing codeword c = (c 0,..., c n ). Secret is c 0 and shares of participants are coordinates c i (1 i n). Minimal authorized sets of secret sharing scheme correspond to minimal codewords of C with 0 in their supports.
32 BINARY REED-MULLER CODES DEFINITION Binary r-th order Reed-Muller code RM(r, m) (0 r m) = set of all binary vectors f of length n = 2 m associated with Boolean polynomials f (x 1, x 2,..., x m ) of degree at most r: c = (f (0,..., 0),..., f (1,..., 1)). Minimum weight d = 2 m r. Minimum weight codewords of RM(r, m) = incidence vectors of AG(m r, 2) in AG(m, 2).
33 BINARY REED-MULLER CODES THEOREM (KASAMI, TOKURA, AND AZUMI) Let f (x 1,..., x m ) be Boolean function of degree at most r, where r 2, such that sup(f ) < 2 m r+1. Then f can be transformed by an affine transformation into f = x 1 x r 2 (x r 1 x r + +x r+2µ 3 x r+2µ 2 ), 2 2µ m r +2, or f = x 1 x r µ (x r µ+1 x r +x r+1 x r+µ ), 3 µ r, µ m r.
34 BINARY REED-MULLER CODES First type of codewords (1) f = x 1 x r 2 (x r 1 x r + +x r+2µ 3 x r+2µ 2 ), 2 2µ m r+2, In PG(m r + 2, 2) defined by X 1 = X 0,..., X r 2 = X 0, cone Ψ with vertex PG(m r + 1 2µ, 2) at infinity, and base non-singular parabolic quadric Q(2µ, 2) in 2µ dimensions having non-singular hyperbolic quadric at infinity.
35 QUADRATIC CONE Galois geometries
36 BINARY REED-MULLER CODES Second type of codewords (2) f = x 1 x r µ (x r µ+1 x r +x r+1 x r+µ ), 3 µ r, µ m r. (Symmetric difference): Union of two (m r)-dimensional affine spaces α and β, but not (m r µ)-dimensional affine intersection space α β.
37 SYMMETRIC DIFFERENCE
38 COUNTING NON-MINIMAL CODEWORDS IN RM(r, m) Non-minimal codeword c = c 1 + c 2, with c 1, c 2 non-zero codewords having disjoint supports. For w(c) < 3 2 m r, c 1 codeword of smallest weight 2 m r, and c 2 codeword of weight 2 m r or quadric or symmetric difference. Number of non-minimal codewords c of weight 2 2 m r calculated by Borissov, Manev, and Nikova. Number of non-minimal codewords c of weight 2 2 m r < w(c) < 3 2 m r calculated by Schillewaert, Storme, and Thas.
39 COUNTING NON-MINIMAL CODEWORDS IN RM(r, m)
40 PROBLEM OF AUTHENTICATION 1 Problem: Alice wants to send Bob a message m. 2 Attacker intercepts m and sends alternated message m to Bob.
41 PROBLEM OF AUTHENTICATION How can Bob be sure that message he gets is correct? Introduce authentication!
42 EXAMPLE OF MESSAGE AUTHENTICATION CODE 1 l = line of PG(2, q). 2 Message m = point of l. 3 Authentication key K = point in PG(2, q)\l. 4 Authentication tag = line through message m and key K.
43
44 EXAMPLE OF AUTHENTICATION CODE 1 If attacker wants to create message (m, K ) without knowing key K, he must guess an affine line through m. There are q possibilities, i.e. the chance for correct attack is 1 q. 2 If attacker already knows authenticated message (m, K ), he knows that key K must lie on the line mk. But for every of q affine points on line mk, there exists line through m. So he cannot do better than guess the key which gives probability of 1 q for successful attack.
45 SECURITY OF AUTHENTICATION CODE 1 p i = probability of attacker to construct pair (m, K ) without knowledge of key K, if he only knows i different pairs (m j, K ). 2 Smallest value r for which p r+1 = 1 is called order of authentication code. 3 For r = 1, p 0 = probability of impersonation attack and probability p 1 = probability of substitution attack. THEOREM If MAC has attack probabilities p i = 1/n i (0 i r), then K n 0 n r. MAC that satisfies this theorem with equality is called perfect.
46 GEOMETRICAL CONSTRUCTION OF PERFECT MAC DEFINITION Generalised dual arc D of order l with dimensions d 1 > d 2 > > d l+1 of PG(n, q) is set of subspaces of dimension d 1 such that: 1 each j subspaces intersect in subspace of dimension d j, 1 j l + 1, 2 each l + 2 subspaces have no common intersection. (n, d 1,..., d l+1 ) = parameters of dual arc.
47 GENERALISED DUAL ARCS THEOREM There exists generalised dual arc in PG( ( ) n+d+1 d+1 1, q), with dimensions d i = ( ) n+d+1 i d+1 i 1, i = 0,..., d Spaces have dimension d 1 = ( ) n+d 1. 2 Two spaces intersect in space of dimension d 2 = ( ) n+d 1 d Three spaces intersect in space of dimension d 3 = ( ) n+d d 2 d
48 LINK BETWEEN MAC AND GENERALISED DUAL ARC 1 π = hyperplane of PG(n + 1, q) and D = generalised dual arc of order l in π with parameters (n, d 1,..., d l+1 ). 2 message m = element of D. 3 key K = point of PG(n + 1, q) not in π. 4 Authentication tag that belongs to message m and key K is generated (d 1 + 1)-dimensional subspace. 5 Perfect MAC of order r = l + 1 with attack probabilities p i = q d i+1 d i.
49
50
51
52 ANONYMOUS DATABASE SEARCH Anonymous database search: query a database anonomously. Peer-to-peer community: let users post queries on behalf of each other. Neighbourhood attack: can be modeled as the intersection of neighbourhoods that may return a single identified person in case of unique neighbourhoods. k-anonymous neighbourhoods: neighbourhood of person is also neighbourhood of at least k 1 other persons.
53
54 TRANSVERSAL DESIGNS Transversal design TD λ (k, n) = k-uniform structure (P, L) of points and blocks, with P = kn, that admits partition of P in k groups of cardinality n, and that satisfies: any group and block contain exactly one common point, every pair of points from distinct groups is contained in exactly λ blocks.
55 FROM AG(2, n) TO TD 1 (k, n) From affine plane AG(2, n) to transversal design TD 1 (k, n), 2 k n. Point set P of TD 1 (k, n) = points of AG(2, n) on k lines of one parallel class of AG(2, n), Groups = lines from this parallel class, Blocks of TD 1 (k, n) = lines of the other parallel classes of AG(2, n), restricted to the points in P.
56 FROM AG(2, n) TO TD 1 (k, n)
57 TRANSVERSAL DESIGN TD 1 (k, n) AND n-anonymous NEIGHBOURHOODS THEOREM Transversal design TD 1 (k, n) has n-anonymous neighbourhoods.
58 THEOREMS Galois geometries THEOREM (STOKES AND FARRÀS) Combinatorial (v, b, r, k)-configuration with n-anonymous neighbourhoods satisfies: There exists partition G = {g i } m i=1 of the point set such that the points in the same part are not collinear and g i n, for all i {1,..., m}, r n and m k.
59 THEOREMS Galois geometries THEOREM (STOKES AND FARRÀS) In combinatorial (v, b, r, k)-configuration C with n-anonymous neighbourhoods and anonymity partition G = {g i } m i=1 and g i = n for all i {1,..., m}, v = n iff m = k. In this case, C is transversal design TD 1 (k, n), and v = kn and b = n 2.
60 APPLICATION IN PAY TELEVISION (Korjik, Ivkov, Merinovich, Barg, and van Tilborg) subscribers = points of PG(2, q), codes = lines of PG(2, q), subscriber quits: codes of lines become invalid, new issue of codes: only necessary when codes of all lines through subscriber become invalid.
61 THE FANO PLANE PG(2, 2)
62 REFERENCES Galois geometries W.-A. Jackson, K.M. Martin, and C.M. O Keefe, Geometrical contributions to secret sharing theory. J. Geom. 79 (2004), W.-A. Jackson, K.M. Martin, and M.B. Paterson, Applications of Galois geometry to cryptology. Chapter in Current research topics in Galois geometry (J. De Beule and L. Storme, Eds.), NOVA Academic Publishers (2012),
63 Thank you very much for your attention!
Applications of finite geometry in coding theory and cryptography
Applications of finite geometry in coding theory and cryptography A. KLEIN, L. STORME Department of Mathematics, Ghent University, Krijgslaan 281 - Building S22, 9000 Ghent, Belgium (Email: {klein,ls}@cage.ugent.be)
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES
More informationFunctional codes arising from quadric intersections with Hermitian varieties
Functional codes arising from quadric intersections with Hermitian varieties A. Hallez L. Storme June 16, 2010 Abstract We investigate the functional code C h (X) introduced by G. Lachaud [10] in the special
More informationLinear Point Sets and Rédei Type k-blocking
Journal of Algebraic Combinatorics 14 (2001), 221 228 c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Linear Point Sets and Rédei Type k-blocking Sets in PG(n, q) L. STORME ls@cage.rug.ac.be
More informationOn the structure of the directions not determined by a large affine point set
On the structure of the directions not determined by a large affine point set Jan De Beule, Peter Sziklai, and Marcella Takáts January 12, 2011 Abstract Given a point set U in an n-dimensional affine space
More informationSecret sharing schemes
Secret sharing schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Introduction Shamir s secret sharing scheme perfect secret
More informationCharacterizations of the finite quadric Veroneseans V 2n
Characterizations of the finite quadric Veroneseans V 2n n J. A. Thas H. Van Maldeghem Abstract We generalize and complete several characterizations of the finite quadric Veroneseans surveyed in [3]. Our
More informationOn small minimal blocking sets in classical generalized quadrangles
On small minimal blocking sets in classical generalized quadrangles Miroslava Cimráková a Jan De Beule b Veerle Fack a, a Research Group on Combinatorial Algorithms and Algorithmic Graph Theory, Department
More informationCodewords of small weight in the (dual) code of points and k-spaces of P G(n, q)
Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),
More informationFinite affine planes in projective spaces
Finite affine planes in projective spaces J. A.Thas H. Van Maldeghem Ghent University, Belgium {jat,hvm}@cage.ugent.be Abstract We classify all representations of an arbitrary affine plane A of order q
More informationLax embeddings of the Hermitian Unital
Lax embeddings of the Hermitian Unital V. Pepe and H. Van Maldeghem Abstract In this paper, we prove that every lax generalized Veronesean embedding of the Hermitian unital U of PG(2, L), L a quadratic
More informationSUBSTRUCTURES OF FINITE CLASSICAL POLAR SPACES
In: Current Research Topics in Galois Geometry Editors: J. De Beule and L. Storme, pp. 33-59 ISBN 978-1-61209-523-3 c 2011 Nova Science Publishers, Inc. Chapter 2 SUBSTRUCTURES OF FINITE CLASSICAL POLAR
More informationA characterization of the finite Veronesean by intersection properties
A characterization of the finite Veronesean by intersection properties J. Schillewaert, J.A. Thas and H. Van Maldeghem AMS subject classification: 51E0, 51A45 Abstract. A combinatorial characterization
More informationCPSC 467b: Cryptography and Computer Security
Outline Authentication CPSC 467b: Cryptography and Computer Security Lecture 18 Michael J. Fischer Department of Computer Science Yale University March 29, 2010 Michael J. Fischer CPSC 467b, Lecture 18
More informationIntroduction to Cryptography Lecture 13
Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple
More informationGeneralized Veronesean embeddings of projective spaces, Part II. The lax case.
Generalized Veronesean embeddings of projective spaces, Part II. The lax case. Z. Akça A. Bayar S. Ekmekçi R. Kaya J. A. Thas H. Van Maldeghem Abstract We classify all embeddings θ : PG(n, K) PG(d, F),
More informationTwo-intersection sets with respect to lines on the Klein quadric
Two-intersection sets with respect to lines on the Klein quadric F. De Clerck N. De Feyter N. Durante Abstract We construct new examples of sets of points on the Klein quadric Q + (5, q), q even, having
More informationJournal of Discrete Mathematical Sciences & Cryptography Vol. 9 (2006), No. 1, pp
Some generalizations of Rédei s theorem T. Alderson Department of Mathematical Sciences University of New Brunswick Saint John, New Brunswick Canada EL 4L5 Abstract By the famous theorems of Rédei, a set
More informationCharacterizations of Veronese and Segre Varieties
Characterizations of Veronese and Segre Varieties Joseph A. Thas and Hendrik Van Maldeghem Dedicated to the memory of A. Barlotti Abstract. We survey the most important characterizations of quadric Veroneseans
More informationOn sets without tangents and exterior sets of a conic
On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior
More informationElliptic Curve Cryptography
Elliptic Curve Cryptography Elliptic Curves An elliptic curve is a cubic equation of the form: y + axy + by = x 3 + cx + dx + e where a, b, c, d and e are real numbers. A special addition operation is
More informationTight Sets and m-ovoids of Quadrics 1
Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K
More informationLocal correctability of expander codes
Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small
More informationEuropean Journal of Combinatorics. Locally subquadrangular hyperplanes in symplectic and Hermitian dual polar spaces
European Journal of Combinatorics 31 (2010) 1586 1593 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Locally subquadrangular hyperplanes
More informationHow to Build Robust Shared Control Systems
Designs, Codes and Cryptography, 15, 111?? (1998) c 1998 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. How to Build Robust Shared Control Systems ROSS ANDERSON rja14@cl.cam.ac.uk
More informationOn Ferri s characterization of the finite quadric Veronesean V 4 2
On Ferri s characterization of the finite quadric Veronesean V 4 2 J. A. Thas H. Van Maldeghem Abstract We generalize and complete Ferri s characterization of the finite quadric Veronesean V2 4 by showing
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir
More informationOn the geometry of regular hyperbolic fibrations
On the geometry of regular hyperbolic fibrations Matthew R. Brown Gary L. Ebert Deirdre Luyckx January 11, 2006 Abstract Hyperbolic fibrations of PG(3, q) were introduced by Baker, Dover, Ebert and Wantz
More informationHyperplanes of Hermitian dual polar spaces of rank 3 containing a quad
Hyperplanes of Hermitian dual polar spaces of rank 3 containing a quad Bart De Bruyn Ghent University, Department of Mathematics, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be Abstract
More informationDivision Property: a New Attack Against Block Ciphers
Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption
More informationCODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.
CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1
More informationTwo-character sets as subsets of parabolic quadrics
Two-character sets as subsets of parabolic uadrics Bart De Bruyn Ghent University Department of Mathematics Krijgslaan 81 (S) B-9000 Gent Belgium E-mail: bdb@cageugentbe Abstract A two-character set is
More informationGeneralized quadrangles and the Axiom of Veblen
Geometry, Combinatorial Designs and Related Structures (ed. J. W. P. Hirschfeld), Cambridge University Press, London Math. Soc. Lecture Note Ser. 245 (1997), 241 -- 253 Generalized quadrangles and the
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism
More informationFinite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2
Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationTheorems of Erdős-Ko-Rado type in polar spaces
Theorems of Erdős-Ko-Rado type in polar spaces Valentina Pepe, Leo Storme, Frédéric Vanhove Department of Mathematics, Ghent University, Krijgslaan 28-S22, 9000 Ghent, Belgium Abstract We consider Erdős-Ko-Rado
More informationOptimal Ramp Schemes and Related Combinatorial Objects
Optimal Ramp Schemes and Related Combinatorial Objects Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo BCC 2017, Glasgow, July 3 7, 2017 1 / 18 (t, n)-threshold Schemes
More informationA spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd
A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd C. Rößing L. Storme January 12, 2010 Abstract This article presents a spectrum result on minimal blocking sets with
More informationCharacterizations of Segre Varieties
Characterizations of Segre Varieties J. A Thas H. Van Maldeghem Abstract In this paper several characterizations of Segre varieties and their projections are given. The first two characterization theorems
More informationOn the nucleus of the Grassmann embedding of the symplectic dual polar space DSp(2n, F), char(f) = 2
On the nucleus of the Grassmann embedding of the symplectic dual polar space DSp(2n, F), char(f) = 2 Rieuwert J. Blok Department of Mathematics and Statistics Bowling Green State University Bowling Green,
More informationLecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography
CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 6, 2017 CPSC 467, Lecture 18 1/52 Authentication While Preventing Impersonation Challenge-response authentication protocols
More informationPerfect Secret Sharing Schemes from Room Squares
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1998 Perfect Secret Sharing Schemes from Room Squares G. R. Chaudhry University
More informationPerfect Secret Sharing Schemes from Room. Squares. Ghulam-Rasool Chaudhry. Centre for Computer Security Research. University of Wollongong
Perfect Secret Sharing Schemes from Room Squares Ghulam-Rasool Chaudhry Hossein Ghodosi Jennifer Seberry Department of Computer Science Centre for Computer Security Research University of Wollongong Wollongong,
More informationMINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev
Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator
More informationSemifield flocks, eggs, and ovoids of Q(4, q)
Semifield flocks, eggs, and ovoids of Q(4, q) Michel Lavrauw Universita degli studi di Napoli Federico II Dipartimento di Matematica e Applicazioni R. Caccioppoli Via Cintia Complesso Monte S. Angelo 80126
More informationSecret Sharing CPT, Version 3
Secret Sharing CPT, 2006 Version 3 1 Introduction In all secure systems that use cryptography in practice, keys have to be protected by encryption under other keys when they are stored in a physically
More informationPolynomials and Codes
TU/e Eindhoven 13 September, 2012, Trieste ICTP-IPM Workshop and Conference in Combinatorics and Graph Theory. Reza and Richard: Thanks for a wonderful meeting. From now on: p is prime and q is a power
More informationThe maximum size of a partial spread in H(4n + 1,q 2 ) is q 2n+1 + 1
The maximum size of a partial spread in H(4n +, 2 ) is 2n+ + Frédéric Vanhove Dept. of Pure Mathematics and Computer Algebra, Ghent University Krijgslaan 28 S22 B-9000 Ghent, Belgium fvanhove@cage.ugent.be
More informationCodes from generalized hexagons
Codes from generalized hexagons A. De Wispelaere H. Van Maldeghem 1st March 2004 Abstract In this paper, we construct some codes that arise from generalized hexagons with small parameters. As our main
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationShult Sets and Translation Ovoids of the Hermitian Surface
Shult Sets and Translation Ovoids of the Hermitian Surface A. Cossidente, G. L. Ebert, G. Marino, and A. Siciliano Abstract Starting with carefully chosen sets of points in the Desarguesian affine plane
More informationA Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors Qian Guo Thomas Johansson Paul Stankovski Dept. of Electrical and Information Technology, Lund University ASIACRYPT 2016 Dec 8th, 2016
More informationAbout Maximal Partial 2-Spreads in PG(3m 1, q)
Innovations in Incidence Geometry Volume 00 (XXXX), Pages 000 000 ISSN 1781-6475 About Maximal Partial 2-Spreads in PG(3m 1, q) Sz. L. Fancsali and P. Sziklai Abstract In this article we construct maximal
More informationLines in higgledy-piggledy arrangement
Lines in higgledy-piggledy arrangement Szabolcs L. Fancsali MTA ELTE Geometric and Algebraic Combinatorics Research Group Budapest, Hungary nudniq@cs.elte.hu Péter Sziklai MTA ELTE Geometric and Algebraic
More informationLecture 15 - Zero Knowledge Proofs
Lecture 15 - Zero Knowledge Proofs Boaz Barak November 21, 2007 Zero knowledge for 3-coloring. We gave a ZK proof for the language QR of (x, n) such that x QR n. We ll now give a ZK proof (due to Goldreich,
More informationLinear Secret-Sharing Schemes for Forbidden Graph Access Structures
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel 1, Oriol Farràs 2, Yuval Mintz 1, and Naty Peter 1 1 Ben Gurion University of the Negev, Be er Sheva, Israel 2 Universitat
More informationNotes 10: Public-key cryptography
MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationCharacterizing Ideal Weighted Threshold Secret Sharing
Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel Tamir Tassa Enav Weinreb October 2, 2006 Abstract Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 16 March 19, 2012 CPSC 467b, Lecture 16 1/58 Authentication While Preventing Impersonation Challenge-response authentication protocols
More informationConstructing Secret Sharing Schemes Based on Cyclic Codes
Constructing Secret Sharing Schemes Based on Cyclic Codes By HOO MEI HUI A project report submitted in partial fulfilment of the requirements for the award of Bachelor of Science (Hons.) Applied Mathematics
More informationEvery generalized quadrangle of order 5 having a regular point is symplectic
Every generalized quadrangle of order 5 having a regular point is symplectic Bart De Bruyn Ghent University, Department of Mathematics, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be
More informationCS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing
Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold
More informationA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson Department of Economics, Mathematics and Statistics Birkbeck, University of London Malet Street, London
More information1 Number Theory Basics
ECS 289M (Franklin), Winter 2010, Crypto Review 1 Number Theory Basics This section has some basic facts about number theory, mostly taken (or adapted) from Dan Boneh s number theory fact sheets for his
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationIncidence Structures Related to Difference Sets and Their Applications
aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž
More informationMessage Authentication Codes (MACs)
Message Authentication Codes (MACs) Tung Chou Technische Universiteit Eindhoven, The Netherlands October 8, 2015 1 / 22 About Me 2 / 22 About Me Tung Chou (Tony) 2 / 22 About Me Tung Chou (Tony) Ph.D.
More informationOn linear sets on a projective line
On linear sets on a projective line M. Lavrauw G. Van de Voorde August 14, 2013 Abstract Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite
More informationBlocking sets of tangent and external lines to a hyperbolic quadric in P G(3, q), q even
Manuscript 1 1 1 1 1 1 1 0 1 0 1 0 1 0 1 0 1 Blocking sets of tangent and external lines to a hyperbolic quadric in P G(, q), q even Binod Kumar Sahoo Abstract Bikramaditya Sahu Let H be a fixed hyperbolic
More informationCOS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018
COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Identification Identification Non- Repudiation Consider signature- based C- R sk ch=r res = Sig(vk,ch) Bob can prove to police
More informationSecret Sharing Schemes
Secret Sharing Schemes 1.1 Introduction 1 1 Handling secret has been an issue of prominence from the time human beings started to live together. Important things and messages have been always there to
More informationIntroduction to Modern Cryptography Lecture 11
Introduction to Modern Cryptography Lecture 11 January 10, 2017 Instructor: Benny Chor Teaching Assistant: Orit Moskovich School of Computer Science Tel-Aviv University Fall Semester, 2016 17 Tuesday 12:00
More informationLecture notes on coding theory
Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors
More informationUNIVERSITÀ DEGLI STUDI DI ROMA LA SAPIENZA. Semifield spreads
UNIVERSITÀ DEGLI STUDI DI ROMA LA SAPIENZA Semifield spreads Giuseppe Marino and Olga Polverino Quaderni Elettronici del Seminario di Geometria Combinatoria 24E (Dicembre 2007) http://www.mat.uniroma1.it/~combinat/quaderni
More informationM.D.S. Codes and Arcs in PG(n, q) with q Even: An Improvement of the Bounds of Bruen, Thas, and Blokhuis
JOURNAL OF COMBINATORIAL THEORY, Series A 62, 139-154 (1993) M.D.S. Codes and Arcs in PG(n, q) with q Even: An Improvement of the Bounds of Bruen, Thas, and Blokhuis L. STORME* AND J. A. THAS Seminar of
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationThe classification of the largest caps in AG(5, 3)
The classification of the largest caps in AG(5, 3) Y. Edel S. Ferret I. Landjev L. Storme Abstract We prove that 45 is the size of the largest caps in AG(5, 3), and such a 45-cap is always obtained from
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 13 March 3, 2013 CPSC 467b, Lecture 13 1/52 Elliptic Curves Basics Elliptic Curve Cryptography CPSC
More informationAdditional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs
Additional Constructions to Solve the Generalized Russian Cards Problem using Combinatorial Designs Colleen M. Swanson Computer Science & Engineering Division University of Michigan Ann Arbor, MI 48109,
More informationPublic Key Cryptography
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Public Key Cryptography EECE 412 1 What is it? Two keys Sender uses recipient s public key to encrypt Receiver uses his private key to decrypt
More informationThe geometry of secants in embedded polar spaces
The geometry of secants in embedded polar spaces Hans Cuypers Department of Mathematics Eindhoven University of Technology P.O. Box 513 5600 MB Eindhoven The Netherlands June 1, 2006 Abstract Consider
More informationSecret Sharing. Qi Chen. December 14, 2015
Secret Sharing Qi Chen December 14, 2015 What is secret sharing? A dealer: know the secret S and distribute the shares of S to each party A set of n parties P n {p 1,, p n }: each party owns a share Authorized
More informationThe geometry of quantum codes. Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda Pambianco
Innovations in Incidence Geometry Volume 6 (2007), Pages 289 307 ISSN 1781-6475 ACADEMIA PRESS The geometry of quantum codes Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda
More informationBounds and spectrum results in Galois geometry and coding theory. Eötvös Loránd University
Synopsis of the Ph.D. thesis Bounds and spectrum results in Galois geometry and coding theory Szabolcs Levente Fancsali Eötvös Loránd University Institute of Mathematics Doctoral School: Mathematics Director:
More informationLax Embeddings of Generalized Quadrangles in Finite Projective Spaces
Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces J. A. Thas H. Van Maldeghem 1 Introduction Definition 1.1 A (finite) generalized quadrangle (GQ) S = (P, B, I) is a point-line incidence
More informationThe structure of quaternary quantum caps
The structure of quaternary quantum caps Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931 (USA) D. Bartoli, G. Faina, S. Marcugini and F.
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationInteractive protocols & zero-knowledge
Interactive protocols & zero-knowledge - interactive protocols formalize what can be recognized by polynomial time restricted verifiers in arbitrary protocols - generalizes NP - zero-knowledge formalizes
More informationL7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015
L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm
More informationCharacterizing Ideal Weighted Threshold Secret Sharing
Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel Tamir Tassa Enav Weinreb August 12, 2004 Abstract Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
More informationStrongly Regular (:, ;)-Geometries
Journal of Combinatorial Theory, Series A 95, 234250 (2001) doi:10.1006jcta.2000.3164, available online at http:www.idealibrary.com on Strongly Regular (:, ;)-Geometries Nicholas Hamilton 1 Vakgroep Zuivere
More informationIdentifying codes in vertex-transitive graphs and strongly regular graphs
Identifying codes in vertex-transitive graphs and strongly regular graphs Sylvain Gravier Institut Fourier University of Grenoble Grenoble, France sylvain.gravier@ujf-grenoble.fr Aline Parreau LIRIS University
More informationPerfect Secret Sharing Schemes Based on Generalized Kirkman Squares
Applied Mathematical Sciences, Vol. 6, 2012, no. 56, 2785-2790 Perfect Secret Sharing Schemes Based on Generalized Kirkman Squares Wang Changyuan School of Mathematics and Statistics Zaozhuang University,
More informationThe minimum weight of dual codes from projective planes
The minimum weight of dual codes from projective planes J. D. Key Department of Mathematical Sciences Clemson University, University of Wales Aberystwyth, University of the Western Cape and University
More informationDiscrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7
EECS 70 Discrete Mathematics and Probability Theory Fall 2014 Anant Sahai Note 7 Polynomials Polynomials constitute a rich class of functions which are both easy to describe and widely applicable in topics
More informationDense near octagons with four points on each line, III
Dense near octagons with four points on each line, III Bart De Bruyn Ghent University, Department of Pure Mathematics and Computer Algebra, Krijgslaan 281 (S22), B-9000 Gent, Belgium, E-mail: bdb@cage.ugent.be
More information